Sciweavers

ICISC
2004
122views Cryptology» more  ICISC 2004»
14 years 2 months ago
Steganography for Executables and Code Transformation Signatures
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techn...
Bertrand Anckaert, Bjorn De Sutter, Dominique Chan...